6 confidential computing use cases that secure data in use

<p>Protecting data in use — information that is being accessed, processed or modified — has traditionally been more difficult than encrypting data in motion or at rest. To address this security gap, organizations are increasingly turning to confidential computing.</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<p><a href=”https://www.techtarget.com/searchcloudcomputing/definition/confidential-computing”>Confidential computing</a> is an advanced approach to encrypting data during active use — whether it’s being read and edited by an employee or processed by an application. Without confidential computing, data in these scenarios is unencrypted, leaving it vulnerable to malicious insiders, misconfigurations and other threats. These risks become exponentially higher when the unencrypted data is in public cloud instances or untrusted environments.</p>
<p>Let’s take a closer look at confidential computing and its enterprise use cases.</p>
<section class=”section main-article-chapter” data-menu-title=”How confidential computing secures data in use”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>How confidential computing secures data in use</h2>
<p>Confidential computing secures data in use by creating secure enclaves — hardware-based trusted execution environments (<a href=”https://www.techtarget.com/searchitoperations/definition/trusted-execution-environment-TEE”>TEEs</a>). The enclaves encrypt data while it is being accessed, processed or modified, keeping it isolated from outsiders. OSes, hypervisors, hardware, application hosts, sysadmins and cloud service providers (CSPs), among other nonauthorized entities, cannot access or edit any data in an enclave.</p>
</section>
<section class=”section main-article-chapter” data-menu-title=”Confidential computing use cases”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Confidential computing use cases</h2>
<p>Consider the following six use cases to learn how enclaves help enterprises keep data in use secure.</p>
<h3>1. Securing data in untrusted environments</h3>
<p>Migrating t

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: